skip to content
Law Institute Victoria
Library Resources
LIV Website - HOME
Practice Resources
Login
Library
Search Catalogue
Request Research
Home
>
Practice Resources
>
Library
>
Full Record
Print Friendly
Full Record
< Back To Results
|
Email Record
Cyber security strategy
Record ID:
64460
Format:
LIJ Article
Year:
2016
Pagination:
14
Subject:
Cybercrime
;
Confidential Information
;
Security
;
Source:
LIJ (2016) 90 No 6
Date_of_entry:
09/09/2016
Notes:
The LCA has been engaging with security and business stakeholders to develop a cyber security information initiative for legal practitioners in Australia.
Section:
Briefs
People:
Law Council of Australia
;
Month:
June
Request Article
Item Availability
Item Availability
Similar Items
Similar Items
Expand
|
Email
|
Save
E-mail, encryption and electronic security
Author:
Davidson, Alan
;
McGregor-Lowndes, Myles
;
Year:
1997
Subject:
Technology
;
Electronic Mail
;
Information Technology
;
Communication of Information
;
Confidential Information
;
Security
;
How secure is your firm?
Author:
Derkley, Karin
;
Year:
2017
Subject:
Law Firms
;
Data Protection
;
Risk Management
;
Cybercrime
;
Security
;
Information Technology
;
Law Office Management
;
DLA Piper
;
The weakest link
Author:
Blomfield, Ian ;
Year:
2017
Subject:
Technology
;
Cybercrime
;
Law Firms
;
Cyberlaw
;
Data Protection
;
Security
;
What is your cover for cyber attacks?
Author:
Legal Practitioners' Liability Committee
;
Year:
2018
Subject:
Risk Management
;
Risk Assessment
;
Cybercrime
;
Professional Liability Insurance
;
Ransom
;
Confidential Information
;
Electronic Transactions
;
Email
;
Computer Hacking
;
Fraud
;
LIV calls for PEXA rethink
Author:
Wilson, Belinda
;
Year:
2018
Subject:
Electronic Conveyancing
;
Security
;
Cybercrime
;
Risk Management
;
Electronic Lodgment
;
Risk Assessment
;
PEXA
;
Wilson, Belinda
;
PEXA hack boosts call for delay
Author:
Derkley, Karin
;
Year:
2018
Subject:
Electronic Conveyancing
;
Security
;
Cybercrime
;
Electronic Lodgment
;
Risk Assessment
;
PEXA
;
Libbis, Simon
;
McCutcheon, Murray
;
Secure in the knowledge
Author:
Hunter, Daniel
;
Year:
1991
Subject:
Security
;
Computer Software
;
Professional Standards Q & A - Security for Solicitors' Costs
Author:
Glennen, Gerard P.
;
Year:
1992
Subject:
Costs
;
Security
;
Contract - confidential information (R of J)
Author:
Hurley, Thomas
;
Year:
1993
Subject:
Contracts
;
Confidential Information
; Grofam P/L v. KPMG Peat Marwick (unreported, 23 July 1993, VG 286.93,Olney J.) ;
Living with spies... ASIO surveillance of writers
Author:
Evans, Richard
;
Year:
1993
Subject:
Bugging and Surveillance
;
Security
; Capp, Fiona ;